Search

Your search keyword '"Kangfeng Zheng"' showing total 59 results

Search Constraints

Start Over You searched for: Author "Kangfeng Zheng" Remove constraint Author: "Kangfeng Zheng" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
59 results on '"Kangfeng Zheng"'

Search Results

1. FedKG: A Knowledge Distillation-Based Federated Graph Method for Social Bot Detection

2. An Investigation of the Behaviors and Characteristics of the Interfacial Bonding Capacity between Cement Emulsified Asphalt Composite Binder and Reclaimed Asphalt Pavement

3. AATMS: An Anti-Attack Trust Management Scheme in VANET

4. An Explainable Machine Learning Framework for Intrusion Detection Systems

5. Using Improved Conditional Generative Adversarial Networks to Detect Social Bots on Twitter

6. Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization

7. Survey of research on application of heuristic algorithm in machine learning

8. CBA-CLSVE: A Class-Level Soft-Voting Ensemble Based on the Chaos Bat Algorithm for Intrusion Detection

9. User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes

10. Improving Reliability: User Authentication on Smartphones Using Keystroke Biometrics

11. A Session and Dialogue-Based Social Engineering Framework

12. Efficient Strategy Selection for Moving Target Defense Under Multiple Attacks

13. SMOTETomek-Based Resampling for Personality Recognition

14. Elastic Switch Migration for Control Plane Load Balancing in SDN

15. Phishing Website Detection Based on Deep Convolutional Neural Network and Random Forest Ensemble Learning

16. Personality Classification of Social Users Based on Feature Fusion

17. Detecting Social Media Bots with Variational AutoEncoder and k-Nearest Neighbor

18. Graph Adaptation Network with Domain-Specific Word Alignment for Cross-Domain Relation Extraction

19. Hierarchical Transformer Network for Utterance-Level Emotion Recognition

20. Fuzzy–synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets

21. Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network

22. Building an Effective Intrusion Detection System Using the Modified Density Peak Clustering Algorithm and Deep Belief Networks

23. ACO-BTM: A Behavior Trust Model in Cloud Computing Environment

24. Efficient User Identity Linkage Based on Aligned Multimodal Features and Temporal Correlation.

25. C2Net-YOLOv5: A Bidirectional Res2Net-Based Traffic Sign Detection Algorithm.

26. Social Engineering Attack-Defense Strategies Based on Reinforcement Learning.

27. A Hybrid PSO-BPSO Based Kernel Extreme Learning Machine Model for Intrusion Detection.

28. Semi-GSGCN: Social Robot Detection Research with Graph Neural Network.

29. A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection.

30. Strategy Selection for Moving Target Defense in Incomplete Information Game.

31. Detecting Malicious Social Robots with Generative Adversarial Networks.

32. User Identification Using Real Environmental Human Computer Interaction Behavior.

33. Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection.

34. WORM-HUNTER: A Worm Guard System using Software-defined Networking.

35. Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining.

36. Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph.

Catalog

Books, media, physical & digital resources